For Business

00:02:14

Keep Your Security Current

Data security requires ongoing vigilance. Includes tips for keeping your business’ security current and for building processes to...
00:02:22

Monitor Your Service Providers

Data security extends beyond your company’s internal operations. You also need to keep a watchful eye on service providers you hire...
00:02:25

Segment and Monitor Your Network

Know who’s coming into your network and keep hackers out. Includes tips for monitoring traffic and segmenting your network.
00:02:09

Store Information Securely

Make sure data is secure in every stage of its life cycle. Use strong encryption to store and transmit sensitive data securely.
00:01:47

Implement Strong Password Policies

Passwords are critical gateways to your company’s databases and networks. But they’re also potential open doors for hackers....

00:02:22

Secure Remote Access

Companies may need to give employees, clients or service providers remote access to their networks. Includes tips for developing your...
00:02:28

Build Security into Development

Creating a new app or software package? Includes tips for keeping data secure during product design, development, testing and roll-...
00:02:05

Control Access to Data

Companies need to manage who gets their hands on their data. Includes tips for controlling access to sensitive data in your business.
00:02:20

Secure Devices and Paper

Companies need to secure anything that transmits sensitive information, including devices and paper. Includes tips for keeping your...
00:01:51

Start with Security

Does your company use personal information? Don’t collect more than you need, and only hold it as long as you have a business need...

00:03:21

Debt Collection

If you’re in the debt collection business, it’s up to you to comply with the Fair Debt Collection Practices Act.
00:05:09

Cobranza de deudas

Si usted se dedica al negocio de cobranza de deudas, usted tiene la responsabilidad de cumplir con la Ley de Cobranza Imparcial de...
00:03:17

Complying with The Funeral Rule

The Funeral Rule gives people making funeral arrangements some important rights. And it establishes some basic requirements for...
00:05:11

Mobile Apps

Developing mobile apps? These tips help you comply with truth-in-advertising standards and privacy principles.
00:04:15

Endorsement Guides

Do your ads use endorsements or testimonials? The FTC’s endorsement guides establish guidelines for advertisers.
00:07:15

Green Guides

If you’re making claims about the environmental benefits of your products, you must back them up with competent and reliable...
00:07:58

The Business Opportunity Rule

If you sell business opportunities, the FTC’s Business Opportunity Rule requires that you give potential buyers a one-page disclosure...
00:03:20

Protecting Your Business From Fraud

Protect your business from con artists who try to fool you into paying for office supplies, business directory listings, or Internet...
00:09:59

Fraud - An Inside Look

Real consumers, who fell for the pitch, tell their stories and a former scammer gives an insider account of how these operations use...
00:02:51

Complying with the CAN SPAM Act

If you use email to promote your products or services, there are seven things you need to know to comply with CAN-SPAM.
00:03:21

Peer-to-Peer File Sharing

Any company that collects and stores sensitive information must consider the security implications of using Peer-to-Peer (P2P) file...
00:01:20

Fraud - An Inside Look (short version)

Real consumers, who fell for the pitch, tell their stories and a former scammer gives an insider account of how these operations use...
00:02:22

Complying with Do Not Call

If you market your products or services by phone -- or if someone has hired you to handle their telemarketing for them -- it's a good...